SlideShare a Scribd company logo
1 of 26
INFORMATION TECHNOLOGY SERVICES
A cybersecurity tutorial for Florida State
University students, faculty and staff
FSU BASIC CYBERSECURITY
TRAINING
INFORMATION TECHNOLOGY SERVICES
OVERVIEW
Cyberthreats
Consequences
Actions
Cybersecurity at Work and Home
University Cybersecurity Resources
Cybersecurity Quiz
CYBERTHREATS
First, let’s talk about
some common cyber
safety threats and the
problems they can
cause.
INFORMATION TECHNOLOGY SERVICES
CYBERTHREATS
Identity Thieves
People who obtain unauthorized
access to your personal
information—such as your
FSUID, SSN, bank accounts and
passwords. They use this to
commit crimes such as fraud or
theft.
Hackers
Hackers are people who secretly
get access to a computer system
in order to steal information or
cause damage.
Malware
Malware (short for "malicious
software") is any program or file
that is harmful to a computer user,
including computer viruses,
worms, Trojans and spyware.
Phishing
Phishing steals personal
information by tricking you into
clicking a link or entering your
username & password. Phishing
comes in many forms: emails,
phone calls, website downloads.
CONSEQUENCES
Defense against
cybersecurity threats
requires your action. If
you do nothing, the
results could be grave.
INFORMATION TECHNOLOGY SERVICES
CONSEQUENCES
Job
Hindrances
• Loss of access to campus computing network
• Inability to access files and do work
Data Loss
• Loss of confidentiality and integrity
• Loss of valuable university info or research
• Compromised personal data
Disciplinary
Actions
• Lawsuits
• Loss of public trust
• Loss of grant opportunities
• Prosecution
• Internal disciplinary action
• Termination of employment
ACTIONS
Follow these tips to
protect yourself, others
and the university from
common cybersecurity
threats.
INFORMATION TECHNOLOGY SERVICES
INFORMATION TECHNOLOGY SERVICES
Top Eight Cybersafety Actions
ACTIONS
Protect Passwords
Prevent Identity Theft
Beware of Phishing
Avoid Malware
Run Antivirus Software
Install Updates
Back Up Important Files
Turn On Firewalls
INFORMATION TECHNOLOGY SERVICES
64% of Americans
have had personal
info exposed by a
data breach
Pew Research Center
INFORMATION TECHNOLOGY SERVICES
PROTECT PASSWORDS
o NEVER share your passwords with anyone!
o Create strong passwords that are difficult to guess
o Avoid dictionary words
o Do not use common passwords, such as password1, abc123, qwerty1,
letmein, yourname1
o Change your passwords periodically and when creating a password
o Use at least eight characters
o Mix uppercase and lowercase letters, numbers and symbols
o Use mnemonics to help you remember a difficult password
o Example: $e^^iNo1e = Seminole
o Example: W00H!TCwontW$ = Woohoo! The Cubs won the World Series
o Use different passwords for different sites
o Store passwords in a safe place
o Never keep passwords on a sticky note near your computer
o Consider using a password vault such as LastPass or KeePass
INFORMATION TECHNOLOGY SERVICES
PREVENT IDENTITY THEFT
o Don’t give out Social Security numbers, driver license numbers, bank
account numbers or other personal information unless you know exactly
who’s receiving it
o Protect other people’s information as you would your own
o Never send personal or confidential information via email, text message, or
instant message
o Every year, order a copy of your credit report from each of the three major
credit bureaus—Equifax, Experian and Trans Union
o www.equifax.com
o www.transunion.com
o www.experian.com
INFORMATION TECHNOLOGY SERVICES
BEWARE OF PHISHING
o Phishing attacks steal personal information by tricking
you into doing something, like clicking a link or entering
your username and password. Phishing comes in many
forms: emails, phone calls, website downloads. These
phishing attempts may look like they are from Florida
State University—often IT Services or the Service
Desk—but don’t fall for the tricks! Follow these tips to
help protect yourself from phishing attacks.
o REMEMBER! FSU WILL NEVER ASK YOU FOR
YOUR FSUID USERNAME AND PASSWORD IN AN
EMAIL OR PHONE CALL.
INFORMATION TECHNOLOGY SERVICES
TIPS TO AVOID PHISHING SCAMS
o Be skeptical of messages that require “immediate action” or threaten that
you will lose something.
o Instead of clicking, type website addresses in your browser to access
sites directly.
o Before clicking, hover over or long tap a link to display the true URL and
see if it is linking to a reputable website.
o Think before clicking email and website links and never click a link that
you don’t trust.
o Do not open attachments you aren’t expecting—especially ZIP files—and
NEVER run .exe files.
o Avoid providing personal information over the phone, especially from an
unsolicited call.
o Never send credit card or other sensitive information via email.
o Use common sense. If it looks like spam, then it probably is spam.
INFORMATION TECHNOLOGY SERVICES
AVOID MALWARE
o Be wary of invitations to download software from unknown sources;
even clicking advertisements can result in malware downloads like
ransomware, spyware, and adware.
o Ransomware is a type of malware that prevents or limits users from
accessing their system—either by locking the screen or encrypting
the user’s files—unless a ransom is paid
o Spyware records your actions and keystrokes to steal your
passwords, credit card numbers, and other confidential information
o Adware not only slows your computer, but can track the sites you
visit
INFORMATION TECHNOLOGY SERVICES
RUN ANTIVIRUS SOFTWARE
o Antivirus software removes viruses and quarantines and repairs
infected files and can help prevent future viruses
o Viruses can be transmitted via email, email attachments or IM
o To avoid computer problems caused by viruses, install and run an
antivirus program like Norton, McAfee or Windows Defender
o Check to see if your antivirus solution is up to date by periodically
opening your antivirus program and checking the last updated date
INFORMATION TECHNOLOGY SERVICES
INSTALL SOFTWARE AND
SECURITY UPDATES
o Updates, also known as patches, fix problems with:
o Operating systems (e.g., Windows 10, Mac OS X, Android and
iOS)
o Software (e.g., Microsoft Office, Creative Cloud)
o Apps (e.g., Wells Fargo, The Weather Channel, Facebook)
o Most new operating systems are set to download updates by
default.
o Work computers should update automatically. Check with your IT
manager to make sure this is the case. Restart your computer after
updates are installed so the patches can be applied immediately.
INFORMATION TECHNOLOGY SERVICES
BACK UP IMPORTANT FILES
o Create offline back-up copies of your files to reduce the risk of
losing important files to ransomware, a virus, computer crash,
theft or disaster
o Save copies of your important documents and files to a flash
drive, external hard drive or online back up service
o Store your back-up files in a secure place away from your
computer, in case of fire, theft or ransomware
o Test your back up files periodically to make sure the files are
accessible and readable
INFORMATION TECHNOLOGY SERVICES
TURN ON FIREWALLS
o Firewalls act as protective barriers between computers and the Internet
o Hackers search the Internet by sending out computer messages to random
computers and waiting for responses
o Firewalls prevent your computer from responding to these calls
o Check your computer's security settings for a built-in personal firewall and
make sure it is turned on
o Mac Firewall
o Microsoft Firewall
CYBERSECURITY AT
WORK AND HOME
Find out how to keep
your information,
computer, and other
devices secure
wherever you are.
INFORMATION TECHNOLOGY SERVICES
o Work with your IT manager before
implementing new cybersecurity
measures
o Talk with your IT manager about
what cybersecurity measures are in
place in your department
o Avoid opening links and attachments
embedded in emails if you cannot
verify the source.
o Use a cross-cut shredder to destroy
documents containing sensitive
information, such as non-directory
student information, FSU proprietary
documents and employee Social
Security numbers and other private
information
o Report to your IT manager any
cybersecurity policy violations,
security weaknesses or any
suspicious activity by unauthorized
individuals in your work area
o Check with your IT manager before
installing any programs on your work
computer
o Take a moment to read the FSU
information policies
at its.fsu.edu//ispo/Policy
o Lock your workstation when
unattended
o Log off your computer when you
leave for the day
CYBERSECURITYAT WORK
INFORMATION TECHNOLOGY SERVICES
o Never leave your laptop, tablet or phone
unsupervised and in plain view
o Password protect all your devices
o Do not install unnecessary programs or
apps on your computer or phone
o Install a firewall on your home network
and PC
o Run a full anti-malware scan regularly
o Watch what you share on social networks.
Criminals can befriend you and easily gain
access to a shocking amount of
information.
o Adhere to copyright restrictions when
downloading software, games, movies or
music.
o Use a separate account for each family
member
o Set up each account as a standard
account
o Have a separate account with
administrator privileges
o Don't use the administrator account
for everyday actions
o Set a screen time-out
o Be careful what info you share on the
phone. If someone calls you asking for
sensitive information, it's okay to say no.
Call the company directly to verify
credentials before giving out any info.
o Always be careful when clicking email
attachments or links. If it's unexpected or
suspicious for any reason, don't click on it.
CYBERSECURITYAT HOME
UNIVERSITY
CYBERSECURITY
RESOURCES
Find out more about
cybersecurity at Florida
State University
INFORMATION TECHNOLOGY SERVICES
o For more info
about cybersecurity
at Florida State
University, visit
its.fsu.edu/ispo
o Follow us on
Twitter
@floridastateITS
UNIVERSITY CYBERSECURITY
RESOURCES
CYBERSECURITY QUIZ Ready to test what you
learned?
INFORMATION TECHNOLOGY SERVICES
CYBERSECURITY QUIZ
Click the picture for the FSU Cybersecurity quiz!
INFORMATION TECHNOLOGY SERVICES
Information Technology Services
Information Security & Privacy Office
Florida State University
cybersecuritytraining@fsu.edu
its.fsu.edu/ispo
Philip Kraemer, Training Coordinator
pkraemer@fsu.edu
Feel free to contact us with questions or comments on information security or
privacy at Florida State University.
CONTACT

More Related Content

Similar to FSU Basic Cybersecurity Training

An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfssusera0b94b
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awarenessKanishk Raj
 
Top 10 Cyber Crime Prevention Tips.pptx
Top 10 Cyber Crime Prevention Tips.pptxTop 10 Cyber Crime Prevention Tips.pptx
Top 10 Cyber Crime Prevention Tips.pptxSarimRyan
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanMegan Bell
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesCatherine MacAllister
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 

Similar to FSU Basic Cybersecurity Training (20)

cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
How to stop computer crime
How to stop computer crimeHow to stop computer crime
How to stop computer crime
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
Top 10 Cyber Crime Prevention Tips.pptx
Top 10 Cyber Crime Prevention Tips.pptxTop 10 Cyber Crime Prevention Tips.pptx
Top 10 Cyber Crime Prevention Tips.pptx
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Protect
ProtectProtect
Protect
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Internet
InternetInternet
Internet
 

More from PraveenKumar313855

CSPAP-Part-2,-Module-2-Classroom-PA.pptx
CSPAP-Part-2,-Module-2-Classroom-PA.pptxCSPAP-Part-2,-Module-2-Classroom-PA.pptx
CSPAP-Part-2,-Module-2-Classroom-PA.pptxPraveenKumar313855
 
Distance Learning for All Sample Presentation.pptx
Distance Learning for All Sample Presentation.pptxDistance Learning for All Sample Presentation.pptx
Distance Learning for All Sample Presentation.pptxPraveenKumar313855
 
AdjOrientationDistanceLearningUpdated060122.pptx
AdjOrientationDistanceLearningUpdated060122.pptxAdjOrientationDistanceLearningUpdated060122.pptx
AdjOrientationDistanceLearningUpdated060122.pptxPraveenKumar313855
 

More from PraveenKumar313855 (7)

CSPAP-Part-2,-Module-2-Classroom-PA.pptx
CSPAP-Part-2,-Module-2-Classroom-PA.pptxCSPAP-Part-2,-Module-2-Classroom-PA.pptx
CSPAP-Part-2,-Module-2-Classroom-PA.pptx
 
Surya Namaskara PPT-1.pptx
Surya Namaskara PPT-1.pptxSurya Namaskara PPT-1.pptx
Surya Namaskara PPT-1.pptx
 
OER Periyar University.ppt
OER Periyar University.pptOER Periyar University.ppt
OER Periyar University.ppt
 
Distance Learning for All Sample Presentation.pptx
Distance Learning for All Sample Presentation.pptxDistance Learning for All Sample Presentation.pptx
Distance Learning for All Sample Presentation.pptx
 
MontrealRoxanneNature.ppt
MontrealRoxanneNature.pptMontrealRoxanneNature.ppt
MontrealRoxanneNature.ppt
 
AdjOrientationDistanceLearningUpdated060122.pptx
AdjOrientationDistanceLearningUpdated060122.pptxAdjOrientationDistanceLearningUpdated060122.pptx
AdjOrientationDistanceLearningUpdated060122.pptx
 
medppt.pptx
medppt.pptxmedppt.pptx
medppt.pptx
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

FSU Basic Cybersecurity Training

  • 1. INFORMATION TECHNOLOGY SERVICES A cybersecurity tutorial for Florida State University students, faculty and staff FSU BASIC CYBERSECURITY TRAINING
  • 2. INFORMATION TECHNOLOGY SERVICES OVERVIEW Cyberthreats Consequences Actions Cybersecurity at Work and Home University Cybersecurity Resources Cybersecurity Quiz
  • 3. CYBERTHREATS First, let’s talk about some common cyber safety threats and the problems they can cause.
  • 4. INFORMATION TECHNOLOGY SERVICES CYBERTHREATS Identity Thieves People who obtain unauthorized access to your personal information—such as your FSUID, SSN, bank accounts and passwords. They use this to commit crimes such as fraud or theft. Hackers Hackers are people who secretly get access to a computer system in order to steal information or cause damage. Malware Malware (short for "malicious software") is any program or file that is harmful to a computer user, including computer viruses, worms, Trojans and spyware. Phishing Phishing steals personal information by tricking you into clicking a link or entering your username & password. Phishing comes in many forms: emails, phone calls, website downloads.
  • 5. CONSEQUENCES Defense against cybersecurity threats requires your action. If you do nothing, the results could be grave.
  • 6. INFORMATION TECHNOLOGY SERVICES CONSEQUENCES Job Hindrances • Loss of access to campus computing network • Inability to access files and do work Data Loss • Loss of confidentiality and integrity • Loss of valuable university info or research • Compromised personal data Disciplinary Actions • Lawsuits • Loss of public trust • Loss of grant opportunities • Prosecution • Internal disciplinary action • Termination of employment
  • 7. ACTIONS Follow these tips to protect yourself, others and the university from common cybersecurity threats.
  • 8. INFORMATION TECHNOLOGY SERVICES INFORMATION TECHNOLOGY SERVICES Top Eight Cybersafety Actions ACTIONS Protect Passwords Prevent Identity Theft Beware of Phishing Avoid Malware Run Antivirus Software Install Updates Back Up Important Files Turn On Firewalls
  • 9. INFORMATION TECHNOLOGY SERVICES 64% of Americans have had personal info exposed by a data breach Pew Research Center
  • 10. INFORMATION TECHNOLOGY SERVICES PROTECT PASSWORDS o NEVER share your passwords with anyone! o Create strong passwords that are difficult to guess o Avoid dictionary words o Do not use common passwords, such as password1, abc123, qwerty1, letmein, yourname1 o Change your passwords periodically and when creating a password o Use at least eight characters o Mix uppercase and lowercase letters, numbers and symbols o Use mnemonics to help you remember a difficult password o Example: $e^^iNo1e = Seminole o Example: W00H!TCwontW$ = Woohoo! The Cubs won the World Series o Use different passwords for different sites o Store passwords in a safe place o Never keep passwords on a sticky note near your computer o Consider using a password vault such as LastPass or KeePass
  • 11. INFORMATION TECHNOLOGY SERVICES PREVENT IDENTITY THEFT o Don’t give out Social Security numbers, driver license numbers, bank account numbers or other personal information unless you know exactly who’s receiving it o Protect other people’s information as you would your own o Never send personal or confidential information via email, text message, or instant message o Every year, order a copy of your credit report from each of the three major credit bureaus—Equifax, Experian and Trans Union o www.equifax.com o www.transunion.com o www.experian.com
  • 12. INFORMATION TECHNOLOGY SERVICES BEWARE OF PHISHING o Phishing attacks steal personal information by tricking you into doing something, like clicking a link or entering your username and password. Phishing comes in many forms: emails, phone calls, website downloads. These phishing attempts may look like they are from Florida State University—often IT Services or the Service Desk—but don’t fall for the tricks! Follow these tips to help protect yourself from phishing attacks. o REMEMBER! FSU WILL NEVER ASK YOU FOR YOUR FSUID USERNAME AND PASSWORD IN AN EMAIL OR PHONE CALL.
  • 13. INFORMATION TECHNOLOGY SERVICES TIPS TO AVOID PHISHING SCAMS o Be skeptical of messages that require “immediate action” or threaten that you will lose something. o Instead of clicking, type website addresses in your browser to access sites directly. o Before clicking, hover over or long tap a link to display the true URL and see if it is linking to a reputable website. o Think before clicking email and website links and never click a link that you don’t trust. o Do not open attachments you aren’t expecting—especially ZIP files—and NEVER run .exe files. o Avoid providing personal information over the phone, especially from an unsolicited call. o Never send credit card or other sensitive information via email. o Use common sense. If it looks like spam, then it probably is spam.
  • 14. INFORMATION TECHNOLOGY SERVICES AVOID MALWARE o Be wary of invitations to download software from unknown sources; even clicking advertisements can result in malware downloads like ransomware, spyware, and adware. o Ransomware is a type of malware that prevents or limits users from accessing their system—either by locking the screen or encrypting the user’s files—unless a ransom is paid o Spyware records your actions and keystrokes to steal your passwords, credit card numbers, and other confidential information o Adware not only slows your computer, but can track the sites you visit
  • 15. INFORMATION TECHNOLOGY SERVICES RUN ANTIVIRUS SOFTWARE o Antivirus software removes viruses and quarantines and repairs infected files and can help prevent future viruses o Viruses can be transmitted via email, email attachments or IM o To avoid computer problems caused by viruses, install and run an antivirus program like Norton, McAfee or Windows Defender o Check to see if your antivirus solution is up to date by periodically opening your antivirus program and checking the last updated date
  • 16. INFORMATION TECHNOLOGY SERVICES INSTALL SOFTWARE AND SECURITY UPDATES o Updates, also known as patches, fix problems with: o Operating systems (e.g., Windows 10, Mac OS X, Android and iOS) o Software (e.g., Microsoft Office, Creative Cloud) o Apps (e.g., Wells Fargo, The Weather Channel, Facebook) o Most new operating systems are set to download updates by default. o Work computers should update automatically. Check with your IT manager to make sure this is the case. Restart your computer after updates are installed so the patches can be applied immediately.
  • 17. INFORMATION TECHNOLOGY SERVICES BACK UP IMPORTANT FILES o Create offline back-up copies of your files to reduce the risk of losing important files to ransomware, a virus, computer crash, theft or disaster o Save copies of your important documents and files to a flash drive, external hard drive or online back up service o Store your back-up files in a secure place away from your computer, in case of fire, theft or ransomware o Test your back up files periodically to make sure the files are accessible and readable
  • 18. INFORMATION TECHNOLOGY SERVICES TURN ON FIREWALLS o Firewalls act as protective barriers between computers and the Internet o Hackers search the Internet by sending out computer messages to random computers and waiting for responses o Firewalls prevent your computer from responding to these calls o Check your computer's security settings for a built-in personal firewall and make sure it is turned on o Mac Firewall o Microsoft Firewall
  • 19. CYBERSECURITY AT WORK AND HOME Find out how to keep your information, computer, and other devices secure wherever you are.
  • 20. INFORMATION TECHNOLOGY SERVICES o Work with your IT manager before implementing new cybersecurity measures o Talk with your IT manager about what cybersecurity measures are in place in your department o Avoid opening links and attachments embedded in emails if you cannot verify the source. o Use a cross-cut shredder to destroy documents containing sensitive information, such as non-directory student information, FSU proprietary documents and employee Social Security numbers and other private information o Report to your IT manager any cybersecurity policy violations, security weaknesses or any suspicious activity by unauthorized individuals in your work area o Check with your IT manager before installing any programs on your work computer o Take a moment to read the FSU information policies at its.fsu.edu//ispo/Policy o Lock your workstation when unattended o Log off your computer when you leave for the day CYBERSECURITYAT WORK
  • 21. INFORMATION TECHNOLOGY SERVICES o Never leave your laptop, tablet or phone unsupervised and in plain view o Password protect all your devices o Do not install unnecessary programs or apps on your computer or phone o Install a firewall on your home network and PC o Run a full anti-malware scan regularly o Watch what you share on social networks. Criminals can befriend you and easily gain access to a shocking amount of information. o Adhere to copyright restrictions when downloading software, games, movies or music. o Use a separate account for each family member o Set up each account as a standard account o Have a separate account with administrator privileges o Don't use the administrator account for everyday actions o Set a screen time-out o Be careful what info you share on the phone. If someone calls you asking for sensitive information, it's okay to say no. Call the company directly to verify credentials before giving out any info. o Always be careful when clicking email attachments or links. If it's unexpected or suspicious for any reason, don't click on it. CYBERSECURITYAT HOME
  • 22. UNIVERSITY CYBERSECURITY RESOURCES Find out more about cybersecurity at Florida State University
  • 23. INFORMATION TECHNOLOGY SERVICES o For more info about cybersecurity at Florida State University, visit its.fsu.edu/ispo o Follow us on Twitter @floridastateITS UNIVERSITY CYBERSECURITY RESOURCES
  • 24. CYBERSECURITY QUIZ Ready to test what you learned?
  • 25. INFORMATION TECHNOLOGY SERVICES CYBERSECURITY QUIZ Click the picture for the FSU Cybersecurity quiz!
  • 26. INFORMATION TECHNOLOGY SERVICES Information Technology Services Information Security & Privacy Office Florida State University cybersecuritytraining@fsu.edu its.fsu.edu/ispo Philip Kraemer, Training Coordinator pkraemer@fsu.edu Feel free to contact us with questions or comments on information security or privacy at Florida State University. CONTACT

Editor's Notes

  1. Ringling ITS installs and updates antivirus
  2. Save copies of your important files to a place where Ringling backs up